Hello,

I've tried searching the list, but it's impossible to search for
'Solaris 10' as the 10 gets excluded regardless.  Anyway, we are porting
some systems over to new hardware and management figures we should now
use Sun's version due to contract issues.  But it's not working and we
are getting nowhere with them.  Note that same ruleset works good under
Solaris 8,9 and ipf 4.1.10

We have a Cisco Pix that does a static NAT.  (ie one to one static fixed
translation, no port mangling/forwarding)  We took all ACLs out,
basically putting the box on the edge.  We configured IPFilter with a
simple ruleset to allow SSH and telnet.  Still it blocks external
traffic, when it has no problems with internal.  Turn IPF off and it
works fine.  Same config on the Pix works fine for the Solaris 9 boxes,
or any other box, yet Sun of course blames it elsewhere.

BTW, not a hardware/chipset issue, as this is happening on both Sparc
(with bge nic) and an old Intel PC with a elx nic.

The rule is as follow:
pass in quick on lo0 all
pass out quick on lo0 all
pass out quick on elxl0 proto tcp from any to any flags S keep state
keep frags
pass out quick on elxl0 proto udp from any to any keep state keep frags
pass out quick on elxl0 proto icmp from any to any icmp-type unreach
pass out quick on elxl0 proto icmp from any to any keep state
block in log quick all with short
pass in quick on elxl0 proto tcp from any to any port = 22 flags S keep
state
pass in quick on elxl0 proto tcp from any to any port = 23 flags S keep
state
pass in quick on elxl0 proto udp from any port = domain to any
block in quick on elxl0 proto icmp from any to any icmp-type 17 keep state
pass in quick on elxl0 proto icmp from any to any  keep state
block in log on elxl0 from any to any

Logs show: 
Mar 13 17:59:36 xxx.xxx.xxx ipmon[142]: [ID 702911 local0.warning]
17:59:36.266417 elxl0 @0:8 b 130.xx.xx.xx,21731 -> 10.0.0.10,23 PR tcp
len 20 40 -A IN
Mar 13 17:59:36 xxx.xxx.xxx ipmon[142]: [ID 702911 local0.warning]
17:59:36.266697 elxl0 @0:8 b 130.xx.xx.xx,21731 -> 10.0.0.10,23 PR tcp
len 20 58 -AP IN
Mar 13 17:59:36 xxx.xxx.xxx ipmon[142]: [ID 702911 local0.warning]
17:59:36.266794 elxl0 @0:8 b 130.xx.xx.xx,21731 -> 10.0.0.10,23 PR tcp
len 20 40 -A IN
Mar 13 17:59:38 xxx.xxx.xxx ipmon[142]: [ID 702911 local0.warning]
17:59:38.103502 elxl0 @0:8 b 130.xx.xx.xx,21731 -> 10.0.0.10,23 PR tcp
len 20 58 -AP IN

Some info requested:
uname -a
SunOS xxx.xxx.xxx 5.10 Generic_118844-19 i86pc i386 i86pc

isainfo -vk
32-bit i386 kernel modules

ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu
8232 index
 1
        inet 127.0.0.1 netmask ff000000
elxl0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
        inet 10.0.0.10 netmask ffff0000 broadcast 10.0.255.255

netstat -rn
Routing Table: IPv4
  Destination           Gateway           Flags  Ref   Use   Interface
-------------------- -------------------- ----- ----- ------ ---------
10.0.0.0            10.0.0.10           U         1     11  elxl0
224.0.0.0            10.0.0.10           U         1      0  elxl0
default              10.0.0.1            UG        1     11
127.0.0.1            127.0.0.1            UH        2     20  lo0

netstat -i
Name  Mtu  Net/Dest      Address        Ipkts  Ierrs Opkts  Oerrs Collis
Queue
lo0   8232 loopback      localhost      64     0     64     0     0      0
elxl0 1500 xxx.xxx.xxx  xxx         22975  0     6082   0     0      0

netstat -s -P ip
IPv4    ipForwarding        =     2     ipDefaultTTL        =   255
        ipInReceives        =  4565     ipInHdrErrors       =     0
        ipInAddrErrors      =     0     ipInCksumErrs       =     0
        ipForwDatagrams     =     0     ipForwProhibits     =     0
        ipInUnknownProtos   =     0     ipInDiscards        =     0
        ipInDelivers        =   498     ipOutRequests       =  5965
        ipOutDiscards       =     0     ipOutNoRoutes       =     0
        ipReasmTimeout      =    60     ipReasmReqds        =     0
        ipReasmOKs          =     0     ipReasmFails        =     0
        ipReasmDuplicates   =     0     ipReasmPartDups     =     0
        ipFragOKs           =     0     ipFragFails         =     0
        ipFragCreates       =     0     ipRoutingDiscards   =     0
        tcpInErrs           =     0     udpNoPorts          =     2
        udpInCksumErrs      =     0     udpInOverflows      =     0
        rawipInOverflows    =     0     ipsecInSucceeded    =     0
        ipsecInFailed       =     0     ipInIPv6            =     0
        ipOutIPv6           =     0     ipOutSwitchIPv6     =     0

ipf -V
ipf: IP Filter: v4.0.2 (500)
Kernel: IP Filter: v4.0.2
Running: yes
Log Flags: 0 = none set
Default: pass all, Logging: available
Active list: 1

ipfstat
bad packets:            in 0    out 0
 input packets:         blocked 1259 passed 4592 nomatch 0 counted 0 short 0
output packets:         blocked 0 passed 5987 nomatch 5 counted 0 short 0
 input packets logged:  blocked 1259 passed 0
output packets logged:  blocked 0 passed 0
 packets logged:        input 0 output 0
 log failures:          input 0 output 0
fragment state(in):     kept 0  lost 0
fragment state(out):    kept 0  lost 0
packet state(in):       kept 6  lost 4
packet state(out):      kept 471        lost 0
ICMP replies:   0       TCP RSTs sent:  0
Invalid source(in):     0
Result cache hits(in):  544     (out):  6
IN Pullups succeeded:   0       failed: 0
OUT Pullups succeeded:  0       failed: 0
Fastroute successes:    0       failures:       0
TCP cksum fails(in):    0       (out):  0
IPF Ticks:      9878
Packet log flags set: (0)
        none

ipfstat -io
pass out quick on lo0 all
pass out quick on elxl0 proto tcp from any to any flags S/FSRPAU keep
state keep frags
pass out quick on elxl0 proto udp from any to any keep state keep frags
pass out quick on elxl0 proto icmp from any to any icmp-type unreach
pass out quick on elxl0 proto icmp from any to any keep state
pass in quick on lo0 all
block in log quick from any to any with short
pass in quick on elxl0 proto tcp from any to any port = ssh flags
S/FSRPAU keep state
pass in quick on elxl0 proto tcp from any to any port = telnet flags
S/FSRPAU keep state
pass in quick on elxl0 proto udp from any port = domain to any
block in quick on elxl0 proto icmp from any to any icmp-type maskreq
keep state
pass in quick on elxl0 proto icmp from any to any keep state
block in log on elxl0 from any to any

ipnat -slv
mapped  in      0       out     0
added   0       expired 0
no memory       0       bad nat 0
inuse   0
rules   0
wilds   0
table 8047b14 list 0
List of active MAP/Redirect filters:

List of active sessions:

List of active host mappings:

Thanks in advance...

-- 

°(((=((===°°°(((===========================================

Reply via email to